CVE-2016-1291
Published Apr 6, 2016
Last updated 5 years ago
Overview
- Description
- Cisco Prime Infrastructure 1.2.0 through 2.2(2) and Cisco Evolved Programmable Network Manager (EPNM) 1.2 allow remote attackers to execute arbitrary code via crafted deserialized data in an HTTP POST request, aka Bug ID CSCuw03192.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C057764-0A1B-41A9-A21B-F665480145AD" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA72A91C-0E65-420A-9DBE-3E0853EDB7C5" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:1.2.0.103:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B257E2F8-30EB-4BCC-8ACF-35DF73107AAC" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B48C1E6-7C18-4C6B-B402-9C0E1A931C2C" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B64A7FCA-1DEA-45B2-9C69-CCDCC848D9B3" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:1.3.0.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E78D776C-AA8C-471D-A0C0-02428FA07A29" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D3206E7-DC91-4861-AD32-46DA82509D5B" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:1.4.0.45:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1704AC8E-BD7E-4882-8BB3-45B9E2AE0F10" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9ACB00E7-41E3-4221-8400-A279A75FD355" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "853315C7-01A7-4E83-9CBB-D45F6B5C4664" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB157A80-3A03-4B8D-9B20-C456A953CF7E" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7678B118-E00C-4B1E-8B40-D3233DE3615C" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56394A07-6D74-4588-8C05-DE04959F7FC7" }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_124:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "09B35C0E-6CBA-4B6B-BCD2-F5CC0BF8CF53" } ], "operator": "OR" } ] } ]